Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • |title=Knapsack-type cryptosystems and algebraic coding theory |journal=Problems of Control and Information Theory. Problemy Upravlenija I Teorii Informacii ...
    5 KB (789 words) - 03:49, 7 July 2023
  • ...n 1965. Olson argues that any group of individuals attempting to provide a public good has difficulty doing so efficiently. On the one hand individuals have == Basic theory of groups == ...
    14 KB (2,334 words) - 15:39, 2 January 2023
  • ...al, Anonymous, and Neutral Culture Model: A Probability Model for Sampling Public Preference Structures |journal=The Journal of Mathematical Sociology |date= ...obabilities |title=Voting Paradoxes and Group Coherence |series=Studies in Choice and Welfare |year=2011 |last1=Gehrlein |first1=William V. |last2=Lepelley | ...
    7 KB (981 words) - 09:03, 25 October 2024
  • ...ions|url=http://link.springer.com/10.1007/s11127-017-0476-2|journal=Public Choice|language=en|volume=173|issue=3–4|pages=267–288|doi=10.1007/s11127-017-0476- ...|last=Weber|first=Robert J.|date=September 1978|title=Comparison of Public Choice Systems|url=https://cowles.yale.edu/publications/cfdp/cfdp-498|journal=Cowl ...
    8 KB (1,140 words) - 04:31, 6 January 2025
  • ...al problems which keep it from fully solving the [[Public good (economics)|public goods problem]], including its vulnerability to [[collusion]] and the issue In other words, our social-choice function is [[utilitarian]]. ...
    14 KB (2,360 words) - 21:07, 8 January 2025
  • ...to raise revenue from a variety of sources to finance [[Public expenditure|public-sector expenditures]]. ...lobal Warming: How Useful is the Lindahl Approach in the Context of Global Public Goods? | date=August 2007 | last=Giersch | first=Thorsten | format=PDF}}</r ...
    17 KB (2,698 words) - 06:54, 23 May 2024
  • * The public has to decide where to [[Optimal facility location|locate a facility]] alon ...(when ''n'' is even, the chosen value is ''p''<sub>n/2</sub>):<blockquote>choice = median(''p''<sub>1</sub>, ..., ''p<sub>n</sub>'').</blockquote> ...
    15 KB (2,324 words) - 10:47, 16 September 2024
  • In [[public-key cryptography]], '''Edwards-curve Digital Signature Algorithm''' ('''EdD The [[reference implementation]] is [[public-domain software]].<ref>{{cite web ...
    18 KB (2,639 words) - 09:04, 1 February 2025
  • {{Short description|Restriction on preferences in social choice}} ...everal consumers have to decide on the amount of [[Public good (economics)|public good]] to purchase. The amount is a one-dimensional variable. Usually, each ...
    10 KB (1,600 words) - 02:43, 19 February 2025
  • ...e [[Monte Carlo method]] or in cryptographic settings, such as issuing a [[public key certificate]], unless specific numerical requirements are satisfied. Po ...s lie in at most <math>(n!m)^{1/n}</math> hyperplanes. Additionally, for a choice of constants <math>c_1,c_2, \ldots, c_n</math> which satisfy the congruence ...
    4 KB (515 words) - 03:56, 16 February 2025
  • ...nalysis]] techniques such as identifying all users, groups, and associated public keys involved in a conversation from an encrypted message observed between ...ossible lengths, in order to minimize the amount of [[Entropy (information theory)|information]] the encrypted data could potentially leak to observers via i ...
    11 KB (1,645 words) - 08:12, 4 January 2023
  • {{Short description|Political theory that examines coalitions, political survival and economy in democracy}} ...other policy areas through subsequent academic publishings and books. The theory is applicable to all types of organizations with leadership, including (amo ...
    17 KB (2,705 words) - 14:35, 1 February 2025
  • {{Short description|Issue yield theory}} In political science, '''Issue Yield''' refers to Issue Yield theory or its derived Issue Yield index. ...
    13 KB (1,734 words) - 23:30, 29 February 2024
  • ...em: extended abstract,” in Proceedings of the 41st annual ACM symposium on Theory of computing (Bethesda, MD, USA: ACM, 2009), 333–342, http://portal.acm.org ...s} \in \mathbb{Z}_q^n</math>, given access to polynomially many samples of choice from <math>A_{\mathbf{s},\phi}</math>. ...
    20 KB (3,183 words) - 23:27, 3 May 2024
  • ...for visits by a family physician: A contingent valuation study|journal=BMC Public Health|volume=10|issue=1|pages=236|doi=10.1186/1471-2458-10-236|issn=1471-2 ...modelling]] techniques may be used to estimate the value of WTA through a choice experiment. [[Contingent valuation|Contingent Value]] techniques are also c ...
    14 KB (2,056 words) - 18:09, 10 June 2024
  • {{Electoral systems|expanded=Social and collective choice}}'''Quadratic voting''' is a [[Social welfare function|voting system]] that ...date=1 July 2017 |title=The robustness of quadratic voting |journal=Public Choice |language=en |volume=172 |issue=1 |pages=75–107 |doi=10.1007/s11127-017-040 ...
    27 KB (3,940 words) - 23:44, 10 February 2025
  • '''Donor coordination''' is a problem in [[social choice]]. There are several donors, each of whom wants to donate some money. Each ...on with divisible targets is similar to the problem of [[fractional social choice]], except that in the latter, the "budget" is fixed in advance (e.g. time, ...
    19 KB (2,744 words) - 17:39, 22 May 2024
  • ...n|year=1974|title=Equity, envy, and efficiency|journal=Journal of Economic Theory|volume=9|pages=63–91|doi=10.1016/0022-0531(74)90075-1|hdl=1721.1/63490|hdl- ...Dimitrios|date=1992-06-01|title=On equity with public goods|journal=Social Choice and Welfare|language=en|volume=9|issue=2|pages=141–157|doi=10.1007/BF001872 ...
    15 KB (2,345 words) - 15:37, 4 October 2024
  • {{Short description|Theory in finance}} ...markets where [[share repurchases]] are allowed. Investors can use the CSS theory to identify undervalued stocks.<ref>{{cite journal|last1=Zürcher|first1=Ulr ...
    14 KB (2,103 words) - 07:03, 15 January 2024
  • ...y that possesses a [[quantum computer]]. This is important because some [[public key algorithm]]s in use today will be easily broken by a quantum computer i ...ms based on these three classically hard problems would be insecure. This public key cryptography is used today to secure Internet websites, protect compute ...
    23 KB (3,540 words) - 00:09, 31 August 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)